Prevention, Detection, Recovery E.T.C

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

THE MWALIMU NYERERE MEMORIAL ACADEMY

KARUME COMPUS ZANZIBAR

DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

NTA LEVEL 6: ORDINARY DEPLOMA IN INFORMATION AND

COMMUNICATION TECHNOLOGY (ICT)

CODE NUMBER: ITT 06104

SUBJECT NAME: SYSTEM ADMINISTRATION AND

SECURITY

NATURE OF ASSIGNMENT: GROUP ASSIGMENT

QUESTION: Explain the various techniques and approaches used to secure computer systems

(prevention, detection, recovery e.t.c)


Technique and approaches used to secure computer system through prevention;

a) Security policy first:

 Make sure that your policy details the limits on access to and dissemination of personal data

about your employees, temps and others who might be targets of investigations. Mishandling this

data can have severe consequences, including legal action. Specify who is allowed to access

what data, under which circumstances, and with whom they are allowed to share this

information.Finally, to protect the organization from allegations of unfair or unequally applied

penalties, make sure your security policy spells out the consequences of misusing company

resources.

b) Use strong authentication:

This is the property of being genuine and being able to be verified and trusted that is confidence

in the validity of a transmission, a message, or a message originator.This means verifying that

users are who they say they are and that each input arriving at the system came from a trusted

source.

c) Secure your desktops:

You can't depend on users to be responsible for all their configurations, but if you're using

Microsoft's Active Directory service, you can use group policies to lock down desktops across

your enterprise.Group policies allow a security manager to set configuration details for the OS

and its components (Internet Explorer, Windows Media Player, etc.), as well as other apps. For

example, you can change the settings for each of Internet Explorer's security zones, enforce the

use of your organization's content filtering internet proxy and even forbid the use of unsigned

third-party macros in Microsoft Office apps. Windows itself comes with a number of sample
template files, and more are available from Microsoft's website or from the Windows or Office

Resource Kits. In addition, make sure access rights to network folders are applied on a strict

need-only basis.

Technique and approaches used to secure computer system through detection;

a) Accountability

This is an additional security goal that generates the requirement for actions of an entity to be

traced uniquely to that entity.This supports nonrepudiation, deterrence, fault isolation, intrusion

detection and prevention and after-action recovery and legal action. Secure systems are not yet

achievable goal, we must be able to trace a security breach to a responsible party.Systems must

keep records of their activities to permit later forensic analysis to trace security breaches or to aid

in transaction disputes.

b) Host Based

A host usually refers to the individual computer or devices that are connected to and

communicate over a network. At the host level, threat detection systems are installed on the

individual devices and monitor all traffic to and from that single device. Malicious activity is

therefore detected only at that device.

c) Network Based

With this technique, strategic points in the network have their traffic monitored. A dedicated

device can be used to analyze the traffic. It is used in conjunction with the Ethernet layer of the

network to analyze packets by predetermined rules.


Technique and approaches used to secure computer system through recovery;

Disaster recovery is generally a planning process and it produces a document which ensures

businesses to solve critical events that affect their activities. Such events can be a natural disaster

(earthquakes, flood, etc.), cyber–attack or hardware failure like servers or routers.There are

several steps you can use in disaster recovery of computer security some of them are the

following;

I. The server room should have an authorized level. For example: only IT personnel should

enter at any given point of time.

II. In the server room there should be a fire alarm, humidity sensor, flood sensor and a

temperature sensor.

III. Backup should be done periodically.

IV. The connectivity to internet is another issue and it is recommended that the headquarters

should have one or more internet lines. One primary and one secondary with a device that

offers redundancy.

V. If you are an enterprise, you should have a disaster recovery site which generally is

located out of the city of the main site. The main purpose is to be as a stand-by as in any

case of a disaster, it replicates and backs up the data.


REFERENCE

Derrick R. (2013) Windows 2012 Server Network Security: Securing Your Windows Network Systems

and Infrastructure. Newnes.

Derrick R. (2011) Security for Microsoft Windows System Administrators: Introduction to Key

Information Security Concepts. Elsevier.

You might also like